University of Oregon

Best Practices

Listed below are a number of resources regarding safe computing best practices. 

Start Here:

Pages

  • This policy specifies that the Data Security Incident Response Procedure must be used in situations where paper or electronic records may have been exposed. See the full policy at http://policies....
  • The Information Services Tech Desk is committed to supporting University-affiliated students, faculty and staff with their computing needs. We are located in the 068 PLC, and our hours of operation...
  • This video explains how to protect yourself from scams, phishing, and other internet schemes. For more information, please contact our Technology Service Desk.
  • Malware is a term used to describe a broad category of damaging software that includes viruses, worms, trojan horses, rootkits, spyware, and adware. The effects of malware range from brief annoyance...
  • Encrypting files is an excellent way to protect your data from being stolen or compromised. When you encrypt your documents or hard drive, you make the information impossible to read without the...
  • 
Creating a Separate Data Partition During Installation
 OS X 10.5 and later    Open Disk Utility during installation.
 Select the hard drive you would like to partition and choose...
  • Types of Malware There are two major types of malicious software when it comes to Android. The first type is by far the most common; they are applications that spam you with ads or redirect you to a...
  •   What are cache and cookies? Cache are files (html, images, multimedia, etc) that are stored locally on your computer so the next time you return to a webpage you are shown the cached version....
  • In OS X 10.8 Mountain Lion and OS X 10.9 Mavericks, there are new default security settings. These new settings make it so that one can only download applications that were written by authorized...
  • Creating a Partition in Windows 7, Vista, and XP   Creating a separate data partition during installation
   During installation of Windows, you will eventually come to a screen that gives...
  • This video provides tips and tricks for safe web browsing and creating secure passwords. For more information, contact the Technology Services Desk.
  • What is phishing? Phishing is a way of attempting to get your sensitive information such as usernames, passwords, PINs and ID numbers. Phishers accomplish this by imitating an often real organization...
  •   Security Resources & Information The UO Technology Service Desk is happy to assist all affiliated members of the university with securing a computer with an antivirus program or...
Syndicate content